Users Guide

Viewing the Conguration Lock Status...................................................................................................................76
Reloading the system...................................................................................................................................................... 76
5 802.1X..........................................................................................................................................................78
Port-Authentication Process..........................................................................................................................................80
EAP over RADIUS.......................................................................................................................................................81
Conguring 802.1X............................................................................................................................................................81
Related Conguration Tasks......................................................................................................................................81
Important Points to Remember...................................................................................................................................... 81
Conguring dot1x Prole ................................................................................................................................................82
Conguring MAC addresses for a do1x Prole.............................................................................................................82
Conguring the Static MAB and MAB Prole .............................................................................................................82
Conguring Critical VLAN ..............................................................................................................................................83
Enabling 802.1X................................................................................................................................................................ 85
Conguring Request Identity Re-Transmissions...........................................................................................................86
Conguring a Quiet Period after a Failed Authentication......................................................................................87
Forcibly Authorizing or Unauthorizing a Port............................................................................................................... 88
Re-Authenticating a Port................................................................................................................................................ 88
Conguring Timeouts......................................................................................................................................................89
Conguring Dynamic VLAN Assignment with Port Authentication.......................................................................... 90
Guest and Authentication-Fail VLANs........................................................................................................................... 91
Conguring a Guest VLAN....................................................................................................................................... 92
Conguring an Authentication-Fail VLAN...............................................................................................................92
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)....................................94
Optimizing CAM Utilization During the Attachment of ACLs to VLANs...................................................................94
Guidelines for Conguring ACL VLAN Groups.............................................................................................................95
Conguring ACL VLAN Groups and Conguring FP Blocks for VLAN Parameters................................................95
Conguring ACL VLAN Groups................................................................................................................................95
Conguring FP Blocks for VLAN Parameters........................................................................................................ 96
Viewing CAM Usage........................................................................................................................................................ 97
Allocating FP Blocks for VLAN Processes....................................................................................................................98
7 Access Control Lists (ACLs)........................................................................................................................ 99
IP Access Control Lists (ACLs).....................................................................................................................................100
CAM Usage...............................................................................................................................................................100
Implementing ACLs on Dell Networking OS.......................................................................................................... 101
Important Points to Remember.................................................................................................................................... 102
Conguration Task List for Route Maps................................................................................................................ 103
Conguring Match Routes...................................................................................................................................... 105
Conguring Set Conditions.....................................................................................................................................106
Congure a Route Map for Route Redistribution.................................................................................................107
Congure a Route Map for Route Tagging........................................................................................................... 108
Continue Clause........................................................................................................................................................108
IP Fragment Handling.................................................................................................................................................... 108
IP Fragments ACL Examples...................................................................................................................................109
Layer 4 ACL Rules Examples...................................................................................................................................109
Contents
5